The weirdest part of a SIM swap attack is how normal it feels at first.
The phone goes quiet. No bars. No texts. No calls. It looks like a carrier hiccup, the kind that fixes itself after a restart.
Then the second wave hits. A password reset email lands. A login alert pops up. A bank notice shows up in an inbox instead of a text. The “carrier hiccup” starts acting like someone moved your phone number onto their device, because that is exactly what happened.
SIM swapping works because a phone number is treated like proof of identity on the internet. That idea is convenient, and also fragile. A phone number can be reassigned by a customer support rep, a retail store employee, or a carrier system that was built for speed. Attackers do not need to break encryption if they can break the process.
The case studies below are real incidents with court filings, SEC disclosures, federal press releases, and reporting behind them. They show the same pattern from different angles: individual theft, corporate intrusion, and even market-moving fraud.
SIM Swap Attack Definition
A SIM swap attack happens when an attacker convinces a mobile carrier to move a victim’s phone number to a SIM card or eSIM the attacker controls.
From that point on, calls and SMS messages go to the attacker. If a service uses SMS one-time codes for login or password resets, the attacker can intercept those codes. That can lead to full account takeover, especially if the first account they take is email.
A closely related term is port-out fraud. That is when the attacker ports the number to a different carrier, not just a different SIM. The outcome is similar: the victim loses the number, and the attacker receives the calls and texts.
Most SIM swap attacks are not “network hacks.” They are administrative abuse. The target is the carrier’s identity checks and internal tools.
SMS Two-Factor Authentication SIM Swap Risk
SMS two-factor authentication is popular because it is easy. It also creates a single point of failure: the phone number.
Here is the hard truth that shows up in every serious SIM swap case: once an attacker has your phone number, they can often rebuild your entire digital identity from the outside.
The usual chain reaction looks like this:
- The attacker gets the number.
- The attacker resets the email account using SMS or recovery flows.
- The attacker uses email access to reset everything else.
- Money moves fast, especially in crypto.
This is not rare. Public reporting and industry writeups have pointed to large numbers of SIM swap incidents and major losses, including figures like roughly 1,075 cases investigated in 2023 with losses approaching $50 million. (thomsonreuters.com)
Those are reported cases. The real number is almost certainly higher, because many people do not report, and some do not even realize the phone number was the entry point.
SIM Swap Attack Mechanics
The technical part is simple once the terms are clear.
A phone number is not “stored” in your phone. Your phone is allowed onto the carrier network because the SIM or eSIM has subscriber identity data. The carrier’s systems decide which SIM identity is allowed to use which phone number.
IMSI MSISDN Reassignment
Two key identifiers matter:
- IMSI: the subscriber identity tied to the SIM or eSIM
- MSISDN: the phone number
A SIM swap is basically an administrative change in the carrier’s backend that says, “this phone number now belongs to that SIM identity.”
When the change propagates, the victim’s phone loses service and the attacker’s phone comes online with the victim’s number.
HLR HSS Provisioning Updates
Carriers use backend databases to track where a subscriber is registered. Older language calls this the HLR. LTE and 5G systems use related components like HSS.
Attackers usually do not touch these systems directly. The change is made through normal carrier tools used by support reps and store employees. That is what makes it so dangerous. The attack rides on legitimate workflows.
SMS One-Time Code Interception
Once the attacker is receiving SMS:
- Password resets become easy.
- Login verification becomes easy.
- Recovery flows become easy.
That is why SIM swapping feels like a master key. Not because it is magical, but because so many services still treat SMS as a trusted channel.
SIM Swap Attack Entry Methods
The case studies later will show different entry points. The core methods are consistent.
Carrier Vishing Social Engineering
This is the classic method: the attacker calls carrier support, pretends to be the victim, and pushes a story like “lost phone” or “new device.”
The attacker usually has personal data already. Data breaches, people-search sites, and social media make it easier than it should be to build a believable identity profile.
Support teams also face pressure: fix the customer’s issue fast, do not escalate, keep the customer happy. That pressure is where security steps get skipped.
Carrier Insider SIM Swap Bribery
When attackers want reliability, they recruit insiders.
In 2019, U.S. prosecutors charged people tied to a SIM swapping ring that relied on carrier insiders. Reporting described how employees and contractors were allegedly bribed to help with SIM swap activity by providing target information or enabling swaps.
The important point is not the specific group name. It is the business model: if one employee can move numbers all day, that employee becomes a high-value asset.
Retail Store Fake ID SIM Swap
Retail store swaps are coming back because fake IDs are easier to make than most people think.
A store employee may do a “reasonable” visual check and still miss a high-quality forgery. In-person presence creates false confidence.
The SEC X account case later shows how this can hit even a government agency.
eSIM Transfer Abuse
eSIM makes it easier to activate service without a physical card. That is great for legitimate users and also useful for criminals.
If an attacker can pass identity checks, an eSIM can be provisioned fast. Some carrier flows even support device-to-device eSIM transfer, which adds more recovery pathways that can be targeted.
Number Porting Automation Risk
When carriers build tools that make switching faster, attackers look for ways to weaponize them.
In late 2025, AT&T sued T-Mobile over its “Easy Switch” feature, and a judge granted a temporary restraining order limiting parts of the tool while litigation continues. Reporting described AT&T’s claims that the tool accessed AT&T systems and data in a way AT&T said was unauthorized.
This is not a confirmed SIM swap crime wave by itself. It is a warning sign: automation that removes friction can also remove safety checks.
Michael Terpin SIM Swap Case
Michael Terpin’s SIM swap case is a blueprint for how high-value crypto theft works.
Terpin sued AT&T after attackers allegedly gained control of his phone number through a SIM swap and stole about $24 million in cryptocurrency.
What makes this case useful is that it is documented in litigation, not just rumor. A Ninth Circuit opinion summary describes the core facts: SIM swap, password reset messages, and crypto theft tied to the carrier account takeover.
Terpin SIM Swap Timeline
Public sources describe the January 2018 incident as a SIM swap that enabled access to Terpin’s online accounts and theft of cryptocurrency.
Terpin later won a $75.8 million civil judgment against Nicholas Truglia in a related case, according to Reuters and a law firm release.
His fight against AT&T has continued for years. A press release from Greenberg Glusker stated the court set the case for trial on March 3, 2026.
Terpin SIM Swap Lessons
This case is not just “someone lost crypto.” It is a stress test for carrier responsibility.
A big legal theme is whether a carrier’s failures can trigger duties under federal law tied to customer proprietary network information. The Ninth Circuit decision revived parts of that theory.
On the practical side, the case also highlights a quiet habit that fuels crypto theft: storing recovery materials where email access can reach them. Once the attacker owns email, old files, cloud storage, password reset links, and “just in case” notes become ammunition.
Robert Ross SIM Swap Case
The Robert Ross case is the nightmare version of “it only takes minutes.”
In October 2018, Ross reportedly lost phone service and then watched as attackers drained $1 million, taking $500,000 from a Coinbase account and $500,000 from a Gemini account, according to reporting based on authorities’ claims.
Nicholas Truglia was charged in connection with the theft, and the reported date of the robbery was October 26.
Ross SIM Swap Speed Problem
This case matters because it shows the timing reality.
Even if a victim reacts quickly, there is usually a delay:
- The carrier has to authenticate the caller.
- The carrier has to escalate fraud.
- The carrier has to reverse the swap.
- The exchange has to freeze activity.
- The exchange has to validate identity again.
Attackers exploit that delay. The money can be gone before the first support ticket is even assigned.
Ross SIM Swap Recovery Problem
The other lesson is recovery.
Crypto theft recovery is hard. Even if a suspect is identified, funds may be moved through multiple wallets, swapped between assets, and sent to places where freezing is unlikely. That asymmetry is why SIM swap crews love crypto targets.
SEC X Account SIM Swap Case
The SEC case is the clearest proof that SIM swap fraud is not just a retail problem.
On January 9, 2024, the official SEC X account posted a false announcement about Bitcoin ETF approval. The SEC later confirmed the account was compromised, and the event moved the price of Bitcoin.
In May 2025, the U.S. Department of Justice announced that Eric Council Jr. was sentenced to 14 months in prison for his role in the conspiracy that hacked the SEC’s X account.
DOJ statements say the false post caused Bitcoin’s price to increase by more than $1,000 immediately after the announcement.
SEC SIM Swap Retail Method
Reporting on the case described a SIM swap attack tied to control of the phone number associated with the account, using identity theft tactics.
What is important here is not the platform. It is the recovery design.
If a high-impact account still depends on SMS for access recovery, then a retail-level SIM swap can become a market-moving event.
SEC SIM Swap Lessons
This case highlights three weak spots that show up in many organizations:
- Shared ownership of critical accounts
- Account recovery tied to a phone number
- Overconfidence in in-store ID checks
Even a perfect password policy does not help if the recovery path leads back to a phone number that can be reassigned.
Joseph Jones T-Mobile SIM Swap Case
The Joseph “Josh” Jones case is one of the most expensive public outcomes tied to SIM swap security failures.
In March 2025, Greenberg Glusker published a press release stating it secured a $33 million arbitration award against T-Mobile tied to a SIM swap attack that led to cryptocurrency theft.
Security reporting on the case said the victim lost about $38 million in cryptocurrency.
A key detail repeatedly mentioned in coverage is that the account allegedly had “heightened security,” including an eight-digit PIN, and the SIM swap still happened.
Jones SIM Swap Legal Signal
Most people think SIM swap losses end with “sorry, call your bank.”
This case signals something else: if a carrier’s processes and controls are shown to be weak, and the harm is measurable, a carrier can face serious financial consequences.
It also shows that arbitration, even though it is usually private, can still become public through press releases and later filings.
Jones SIM Swap Practical Signal
The eight-digit PIN detail is the gut punch.
A PIN helps, but it is not the final authority if:
- A rep overrides it.
- An insider bypasses normal checks.
- The attacker gains access to the carrier account online.
This case pushes a simple conclusion: the best defense is reducing how many systems treat the phone number as a security token.
Gregg Bennett Bittrex SIM Swap Case
Gregg Bennett’s case shows the “two-system failure” problem: the carrier fails, and the financial platform fails.
CoinDesk reported that Bennett sued Bittrex after a SIM swap attack led to the theft of 100 bitcoin, worth close to $1 million at the time.
CoinDesk also reported that a Washington State Department of Financial Institutions examiner concluded Bittrex did not take “reasonable steps” to respond to Bennett’s notice and appeared to violate its own terms.
Bennett SIM Swap Exchange Controls
This case matters because it shifts the discussion away from “carriers are the only problem.”
Exchanges and financial platforms can add controls that reduce SIM swap damage, such as:
- Stronger withdrawal verification
- Time delays for new devices
- Risk-based authentication
- Human review for large withdrawals
SIM swapping often works because two parties treat the phone number as trusted. Breaking that assumption on either side can reduce the blast radius.
Scattered Spider SIM Swap Tactics
Not every SIM swap story ends as personal theft. Sometimes it is step one in a bigger intrusion.
The group often labeled “Scattered Spider” has been tied to major attacks on MGM Resorts and Caesars Entertainment in 2023, with strong emphasis on social engineering and identity-based access.
MGM filed an 8-K stating it estimated a negative impact of approximately $100 million to adjusted property EBITDAR from the cybersecurity issue.
Reuters reporting later noted that Caesars paid around $15 million in ransom, citing Wall Street Journal reporting, in connection with regaining access to its systems.
Corporate SIM Swap Link
SIM swapping and corporate breaches overlap when MFA is tied to phone-based factors.
Even when a company uses an authenticator app, helpdesk workflows can reintroduce phone risk. A helpdesk that can reset MFA after a phone call is effectively an alternative login system, and attackers know it.
This is why corporate identity security often fails in the least technical place: the process for “I lost my phone, help.”
Scattered Spider Social Engineering
Reuters described the broader pattern of these attackers as young, English-speaking, and highly effective at social engineering.
That detail matters because it helps explain why defenses fail. A lot of security training is built around spotting foreign-language phishing emails. Many modern SIM swap crews sound local, understand slang, and know exactly what a real employee would say.
SIM Swap Carrier Liability Cases
SIM swapping has forced carriers, regulators, and courts to deal with an awkward reality: phone numbers became identity keys by accident, and the protection around them often looks like customer service, not security engineering.
Federal Communications Act CPNI
The Terpin litigation has highlighted claims tied to federal duties around customer proprietary network information and how carriers authenticate account changes.
This matters because it moves the discussion beyond “terms of service.” If statutory duties apply, fine print becomes less powerful.
Verizon FCC CPNI Penalty
In September 2025, a Second Circuit decision upheld an FCC forfeiture against Verizon tied to failure to reasonably safeguard customer proprietary network information, including location data, with a penalty of $46.9 million referenced in case materials.
This is not a SIM swap case, but it is part of the same legal foundation: carriers have duties to protect sensitive customer network information.
There is also a live legal debate about how the FCC can enforce these penalties. Reuters reported in January 2026 that the U.S. Supreme Court agreed to hear a case challenging the FCC’s power to impose fines through its administrative process, involving major carriers and privacy-related penalties.
That is one of those “watch this space” moments. Regulatory power shapes how much pressure carriers feel to improve.
Carrier Switching Tool Litigation
The AT&T vs T-Mobile “Easy Switch” dispute is another signal that phone-number portability is colliding with security.
Reports in December 2025 described a court order limiting parts of the tool while the case plays out.
Even if this case ends up being mostly about competitive behavior, it highlights a security truth: automation can scale fraud just as well as it scales convenience.
SIM Swap Attack Warning Signs
SIM swap attacks give a small window. It is not generous, but it is real.
The warning signs that show up most often in documented cases:
- Sudden loss of cell service with no obvious outage
- SMS messages stop arriving, but apps on Wi-Fi still work
- Password reset emails or login alerts you did not trigger
- Notifications about a SIM change, eSIM activation, or number transfer
- Account recovery prompts that appear when you did not request them
One simple test helps: if the phone loses service and security alerts begin within minutes, treat it as fraud until proven otherwise.
SIM Swap Incident Response Steps
When a SIM swap is in progress, the goal is to cut off the attacker’s advantage. That means reclaiming the number and locking down the accounts that rely on it.
Carrier Fraud Escalation
- Call the carrier from another phone and say “SIM swap fraud” or “number port fraud.”
- Ask for the fraud department or account takeover team.
- Request a freeze on porting and SIM changes.
- Ask for a review of recent account changes, including who performed them and through which channel.
Speed matters because every minute the attacker holds the number is another chance to reset a password.
Email Account Containment
Email is usually the main prize.
- Change the email password immediately from a trusted device.
- Revoke active sessions if the provider supports it.
- Remove SMS as a recovery factor if possible.
- Replace with app-based MFA or a security key.
Financial Platform Containment
- Contact banks and exchanges and request withdrawal freezes.
- Reset passwords and review API keys if the platform supports them.
- Look for new devices, new addresses, or new beneficiary accounts.
- Save evidence: screenshots, timestamps, support ticket numbers.
Evidence Preservation
This is boring, but it helps.
- Keep carrier emails about SIM changes.
- Record the exact time service dropped.
- Keep logs of login alerts and withdrawal confirmations.
- File reports where appropriate, especially if financial theft occurred.
A clean timeline is often the difference between “it happened” and “we can prove it happened.”
SIM Swap Prevention Passkeys FIDO2
SIM swap prevention is mostly about reducing how many systems treat a phone number as proof of identity.
Passkeys FIDO2 Hardware Keys
The strongest shift is moving from SMS to phishing-resistant authentication:
- Passkeys reduce dependence on phone numbers.
- Hardware security keys can block remote takeovers even if the phone number is stolen.
The point is not perfection. The point is removing the phone number from the critical path.
Account Recovery Redesign
Most account takeovers happen through recovery, not through password guessing.
- Remove your phone number from recovery flows where possible.
- Use backup codes stored offline.
- Avoid storing seed phrases or recovery secrets in email or cloud notes.
Carrier Account Hardening
Carrier controls are still worth using, even if they are not flawless:
- Account PINs
- Port-out locks
- Number locks
- In-store verification notes
These controls reduce casual attacks. They are less reliable against insiders, but they still raise the cost for attackers.
Public Exposure Control
SIM swap crews often choose targets who look profitable.
A few habits lower attention:
- Do not post phone numbers publicly unless needed.
- Do not post screenshots that reveal account balances.
- Treat your mobile number like a semi-public identifier, not a secret.
Outlook
SIM swapping is a nasty mix of old systems and modern money.
Carriers built number portability for convenience and competition. Online services built SMS 2FA for ease and adoption. Crypto and instant payments made theft fast and hard to reverse. Put those together, and a phone number becomes a high-value asset that can be stolen with paperwork, persuasion, or bribery.
The most interesting shift right now is not a new attack trick. It is a slow change in what counts as identity.
As passkeys spread and SMS 2FA becomes less central, SIM swaps lose power. Until then, SIM swapping stays attractive because it is low-effort compared to “real hacking,” and it often works on the first try.

